software security

Results 276 - 300 of 395Sort Results By: Published Date | Title | Company Name
Published By: Black Duck Software     Published Date: Dec 29, 2015
Addressing the constantly-morphing landscape of open source security threats might seem like a never-ending process, but we’ll help you get started in four easy steps.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications, business technology
    
Black Duck Software
Published By: Black Duck Software     Published Date: Dec 29, 2015
Security teams understand that developers turn to open source to save time, cut costs, and promote innovation. But getting a handle on the security implications of open source use can be difficult. Learn how to identify security vulnerabilities and monitor your codebase for future security.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications, business technology
    
Black Duck Software
Published By: Black Duck Software     Published Date: Dec 29, 2015
Many organizations think they have application security covered, but most security testing tools leave companies exposed. With over 4,000 open source vulnerabilities reported every year, make sure your company’s applications aren’t at risk!
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications, business technology
    
Black Duck Software
Published By: Black Duck Software     Published Date: Dec 29, 2015
Today, companies are more concerned than ever about software security threats. With some 95 percent of companies relying on open source software, its security is now a critical focus for CEOs, COOs, and boards of directors. Learn which security tools and methodologies are best suited for your organization's environment.
Tags : 
black duck, open source, application security, security, compliance, appsec, software vulnerabilities, risk management, open source management, open source monitoring, oss, oss security, open source tools, open source software, open source scanning, enterprise applications, business technology
    
Black Duck Software
Published By: Cylance     Published Date: Jul 02, 2018
Matthew Coy, Safelite’s Vice President of Information Technology, is responsible for overseeing all aspects of the company’s IT infrastructure, including selecting, administering, and supporting technology products. The company handles personally identifiable information, including credit card information and insurance data collected from several sources, and must comply with insurance industry regulations and the Payment Card Industry Data Security Standard. Safelite is the target of constant external attacks. The organization experienced ongoing security issues stemming from infected software, drivebys and other malicious downloads. According to Matthew, “A lot of malware and email viruses were making it through the environment, all bypassing our email security and AV.” Not only were the security controls ineffective, the previous AV platform required nearly 150 hours per week to manage. Matthew knew Safelite needed to make a change, and fast. Having worked with Cylance® at two previous companies, he was confident CylancePROTECT® could significantly improve Safelite’s endpoint security. Read the full case study to learn about the results Cylance was able to deliver.
Tags : 
safe, lite, cybersecurity, data
    
Cylance
Published By: Cylance     Published Date: Aug 22, 2018
Even if one minute a day is lost to productivity drains because of PC horsepower allocation to security scans and remediation, the cost over a year across a medium-sized enterprise adds up quickly. A 10,000 employee operation would face over $10M in direct productivity losses alone. As an early trigger for expensive PC hardware refresh is an onslaught of help desk calls, many companies find that they can actually extend the hardware refresh cycle out another 12–24 months simply by employing a security solution that does not tax the PC as heavily. The indirect costs associated with brand reputation and opportunity losses add untold thousands of dollars per year as well. Further, some institutions under green initiatives monitor power consumption related to security measures favor solutions that use less energy. As such, forward-thinking enterprises are looking beyond the software license fees when evaluating security software alternatives.
Tags : 
system, resource, impact, testing, cylance
    
Cylance
Published By: OKTA     Published Date: Apr 24, 2018
"It’s important to understand the role that an Identity platform plays in modern enterprise IT. In the past, Identity and Access Management systems were an afterthought. They were put into place after making many of your other architectural decisions. With the move to web, cloud and mobile, IAM has become a key variable in hardware and software deployment, as well as in operational strategy. This webinar will reveal why leveraging an IAM platform, built as a single cloud-based platform for security across on-prem and cloud, can solve these issues."
Tags : 
    
OKTA
Published By: GFI Software     Published Date: Feb 24, 2012
Regardless of whether your organization uses Windows-based PCs or Macs or a mix of both, you need a solution that provides protection for all operating systems. Read to learn more.
Tags : 
gfi software, hacker detection, security, technology, data protection, intrusion detection
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2012
Social networking has changed the way businesses communicate with their customers and partners, with most organizations now incorporating social media into their marketing and communications strategies. Unsurprisingly, the popularity of this new media has also created an influx of social-specific malware. Read to find out more about this trend.
Tags : 
gfi software, technology, security, malware, social media, smb, internet security, identity security
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2012
There are hundreds of rogue anti-malware products on the Internet that infect PCs rather than detect malware. Learn how these scams look and work and how to prevent your computer from becoming infected.
Tags : 
gfi software, technology, security, malware, internet security, intrustion detection, anti-virus
    
GFI Software
Published By: GFI Software     Published Date: Feb 24, 2012
During this webcast, GFI Senior Threat Researcher Chris Boyd discussed:How to identify botnets in your systems, how to remediate botnet malware, how to maximize protection against botnets and how to educate users to prevent infections.
Tags : 
gfi software, technology, security, application security, anti virus, intrusion detection
    
GFI Software
Published By: Dell Software     Published Date: May 10, 2013
Have you ever had problems securing Active Directory? In this Dell technical brief, learn about three critical tasks administrators often overlook – and why doing them helps maximize AD security.
Tags : 
dell software, active directory, ad security, dell technical brief
    
Dell Software
Published By: Nemx Software Corporation     Published Date: Mar 15, 2007
Organizations are struggling to enforce both mandatory regulatory rules as well as internal corporate policies governing email content and distribution.  One of the biggest obstacles is determining whether or not the content of an email, or its attachment, is subject to any policy rules or restrictions.  This whitepaper describes the techniques required to perform intelligent, accurate content analysis and the shortcomings of most current approaches.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, nemx, data management
    
Nemx Software Corporation
Published By: Nemx Software Corporation     Published Date: Feb 22, 2007
For most  organizations email compliance management is synonymous with outbound email control. This white paper describes how internal email control is crucial to an organization's compliance mandate and the underlying technical architecture required to do it effectively.
Tags : 
corporate governance, hipaa compliance, sarbanes oxley compliance, software compliance, content management system, messaging, document management, secure content management, compliance, email security, encryption, policy based management, security management, email control, email policy, compliance management, nemx, nemx software
    
Nemx Software Corporation
Published By: Sunbelt Software     Published Date: Aug 10, 2007
Sunbelt Software engaged Osterman Research to survey organizations that are using five different email management systems including Barracuda Spam Firewall, GFI MailEssentials, McAfee GroupShield for Microsoft Exchange, and Symantec Brightmail and Sunbelt Ninja Email Security.
Tags : 
email management, email, email security, messaging, spam, anti spam, spyware, anti spyware, virus, anti virus, sunbelt, sunbelt software, architecture, phishing, policy based, policy-based, malware, trojan, trojans, mail server
    
Sunbelt Software
Published By: Intermedia     Published Date: Nov 10, 2008
Microsoft Exchange is the leading business email and collaboration solution for the small,up to the large, business markets, and this whitepaper compares the security of Microsoft Exchange Services deployed in-house versus a hosted model with SaaS service providers. By choosing Intermedia as their Hosted Exchange SaaS Solution Provider, businesses can achieve email and total messaging security, as well as a piece of mind, by leveraging Intermedia’s infrastructure and experience with running a secured messaging platform.
Tags : 
intermedia, email security, logical server security, software as a service, saas, microsoft exchange services, security assessment testing, security
    
Intermedia
Published By: SERENA Software, Inc     Published Date: Jun 23, 2009
Learn how you can simplify compliance and automate the transition from development to production with complete traceability.  Benefit from process definition and enforcement, and automatic generation of audit trails.  Add consolidation to single, global repository where you move code into a single software change and configuration management instance that works globally, but performs as if everything were local.  Result: savings and productivity.
Tags : 
serena, compliance, traceability, enforment, software, single software, alm, collaboration, efficiency, productivity, enterprise, application lifecycle management, gartner, mission critical, sox, hippa, cmmi, audit, enforcement, security
    
SERENA Software, Inc
Published By: CarbonBlack     Published Date: Mar 16, 2016
It is now widely recognized that antivirus software is insufficient to protect organizations, large or small, from advanced threats and targeted attacks. In response, organizations are increasingly looking to adopt proactive approaches to security, such as application control, to ensure the fidelity and security of intellectual property.
Tags : 
application control, advanced threats, security, proactivity approaches, security
    
CarbonBlack
Published By: Splunk     Published Date: Apr 16, 2012
Discover a unique approach to handling large, semi-structured or unstructured time-series data. Splunk can be deployed in a matter of days to provide rapid cross-correlation between different data types-giving you unprecedented operational visibility.
Tags : 
splunk, data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance, log management operations, operations, operational intelligence, data management
    
Splunk
Published By: Splunk     Published Date: Apr 16, 2012
This analyst ROI case study reveals how Ongame, a leading online gaming platform, used Splunk to gain greater visibility and efficiency from their application production process. Discover how Ongame improved DevOps collaboration and reduced downtime.
Tags : 
splunk, ongame, gaming, gaming platform, devops, collaboration, downtime, efficiency, data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance
    
Splunk
Published By: Splunk     Published Date: Apr 16, 2012
Using Splunk, Cricket was able to identify system degradation and failures, even in the application area of Cricket's highly-automated and virtualized environment. Read about Cricket's impressive hard and soft ROI.
Tags : 
splunk, cricket communications, virtualization, automation, customer behavior, data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance, log management operations, operations
    
Splunk
Published By: Splunk     Published Date: Apr 16, 2012
Read how Splunk enabled WhitePages, the largest on-line directory of people and businesses, to protect the site's content and the brand by monitoring abusive site traffic and learn how Splunk's in-house search eliminated a data warehouse investment.
Tags : 
splunk, whitepages, traffic, warehouse, data warehouse, directory, investment, threats data, analyzying, decision making, ime-series data, log management, log management software, manage logs, analyze logs, log analyzer, security log analysis, log management intelligence, log management compliance, compliance
    
Splunk
Published By: Webroot Inc     Published Date: Jan 14, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 7 Ultimate Edition (64-bit) during January 2014. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products.
Tags : 
endpoint performance, performance testing, security software, security
    
Webroot Inc
Published By: Webroot Inc     Published Date: Jan 14, 2015
Seeing traditional security software become too big and too much of a burden on endpoint devices, networks and IT staff, Webroot decided to start fresh. We built a new type of security software that completely does away with old-school approaches like signature downloads, the need for constant updates and big footprint client software. The result is Webroot SecureAnywhere Business Endpoint Protection, the fastest, least disruptive and most effective endpoint protection - ever.
Tags : 
endpoint protection, networks, security software, endpoint devices, security
    
Webroot Inc
Published By: Webroot Inc     Published Date: Aug 01, 2015
PassMark Software® conducted objective performance testing on eight (8) security software products, on Windows 8.1 (64-bit) during July and August 2015. This report presents our results and findings as a result of performance benchmark testing conducted for these endpoint security products. The aim of this benchmark was to compare the performance impact of Webroot’s SecureAnywhere Business Endpoint Protection product with seven (7) competitor products. Testing was performed on all products using 13 performance metrics, including: installation time, boot time, CPU Usage, Memory Usage, Browse Time and many others. Does your endpoint security measure up?
Tags : 
endpoint performance, software security, endpoint security products, performance metrics, security
    
Webroot Inc
Start   Previous    2 3 4 5 6 7 8 9 10 11 12 13 14 15 16    Next    End
Search      

Related Topics

Add Your White Papers

Get your white papers featured in the Data Center Frontier Paper Library contact:
Kevin@DataCenterFrontier.com